Thidot2

27 Questions | Attempts: 341
Share

SettingsSettingsSettings
Algorithm Quizzes & Trivia

Questions and Answers
  • 1. 

    Which of the followig FOL sentences most matches the meaning of "Squares adjacent to wumpus are smelly"?

    • A.

      ThereExist S1 Smelly(S1) ThereExist S2 Adjacent(S1,S2) ^ Wumpus(S2)

    • B.

      ForAll S1 Smelly(S1) ForAll S2 Adjacent(S1,S2) ^ Wumpus(S2)

    • C.

      ForAll S1 Smelly(S1) ThereExist S2 Adjacent(S1,S2) ^ Wumpus(S2)

    • D.

      ThereExist S1 Smelly(S1) ForAll S2 Adjacent(S1,S2) ^ Wumpus(S2)

    Correct Answer
    C. ForAll S1 Smelly(S1) ThereExist S2 Adjacent(S1,S2) ^ Wumpus(S2)
  • 2. 

    How many heuristic function are there for a given problem?

    • A.

      1

    • B.

      0

    • C.

      2

    • D.

      Infinitely many

    Correct Answer
    D. Infinitely many
  • 3. 

    If the heuristic function in an A* search algorithm is h( n) = 0, this A* search algorithm becomes which of the following algorithms?

    • A.

      Uniformed-cost search

    • B.

      Depth-first search

    • C.

      Iterative deepening search

    • D.

      Depth-limited search

    Correct Answer
    A. Uniformed-cost search
  • 4. 

    Which of the following algorithms is NOT a local search algorithm?

    • A.

      Hill-climbing search

    • B.

      Simulated annealing search

    • C.

      Genetic algorithm

    • D.

      A* search

    Correct Answer
    D. A* search
  • 5. 

    Regarding relational database manipulation, which of the following statements correctly explains projection?

    • A.

      . Create a table by combining inquiry results from one table and the ones of the other table

    • B.

      Create a new table by combining tuples satisfying conditions from tuples in more than two tables

    • C.

      Extract the rows satisfying specific conditions from the table

    • D.

      . Extract the specific columns from the table

    Correct Answer
    D. . Extract the specific columns from the table
  • 6. 

    Which of the following SQL statements can extract employee_name has whose salary is 300,000 or higher from the table human_resource?

    • A.

      SELECT salary FROM human_resource WHERE employee_name>=300000 GROUPBY salary

    • B.

      SELECT employee_name, salary FROM human_resource GROUPBY salary HAVING COUNT(*)>300000

    • C.

      SELECT employee_name FROM human_resource WHERE salary>=300000

    • D.

      SELECT employee_name COUNT(*) FROM human_resource WHERE salary>=300000 GROUPBY employee_name

    Correct Answer
    C. SELECT employee_name FROM human_resource WHERE salary>=300000
  • 7. 

    Which of the following does not belong to 9 heuristics?

    • A.

      Speak user language

    • B.

      Easy to use

    • C.

      Provide clearly marked exits

    • D.

      . Minimize user memory load

    Correct Answer
    B. Easy to use
  • 8. 

    N a heuristic evaluation:

    • A.

      A group of test users conduct a formal experiment

    • B.

      A group of usability experts judge an interface with a detailed checklist of guidelines

    • C.

      a group of psychologists administer a questionnaire

    • D.

      A group of usability experts review a user interface according to a small set of principles

    Correct Answer
    D. A group of usability experts review a user interface according to a small set of principles
  • 9. 

    Post-test questionnaires (conducted after a usability test) are particularly useful for measuring?

    • A.

      safety

    • B.

      User satisfaction

    • C.

      . efficiency

    • D.

      learnability

    Correct Answer
    B. User satisfaction
  • 10. 

    Post-test questionnaires (conducted after a usability test) are particularly useful for measuring?

    • A.

      safety

    • B.

      User satisfaction

    • C.

      . efficiency

    • D.

      learnability

    Correct Answer
    B. User satisfaction
  • 11. 

    Valid reasons for usability testing are:

    • A.

      Experience changes ones perception of the world

    • B.

      Evaluate the performance of the interaction

    • C.

      . Designers believe users always follow illogical paths

    • D.

      Testing the performance under user stress is important

    Correct Answer
    A. Experience changes ones perception of the world
  • 12. 

    A method that does not require human participants serving as test users is the

    • A.

      Heuristic evaluation

    • B.

      Rubin’s comparison test

    • C.

      Usability test

    • D.

      Pluralistic walkthrough

    Correct Answer
    A. Heuristic evaluation
  • 13. 

    Which of the following is an accurate statement concerning an ADSL?

    • A.

      It enables high-speed data transmission of differing incoming and outgoing speeds, using the existing telephone line (twisted pair).

    • B.

      Optical fiber cable is laid down to the home to enable various communication services such as telephony, ISDN, and data communications.

    • C.

      Voice and data are sent by time-divided multiplexing.

    • D.

      . Voice and data are separated by a terminal adapter (TA), so they can share the same line.

    Correct Answer
    A. It enables high-speed data transmission of differing incoming and outgoing speeds, using the existing telephone line (twisted pair).
  • 14. 

    What is the appropriate description of a router?

    • A.

      Converts protocols, including protocols of levels higher than the transport layer, and allows interconnection of networks having different network architectures.

    • B.

      Connects at the data-link layer and has traffic separating function.

    • C.

      Connects at the physical layer and is used to extend the connection distance.

    • D.

      Connects at the network layer and is used for interconnecting LAN systems to wide area network.

    Correct Answer
    D. Connects at the network layer and is used for interconnecting LAN systems to wide area network.
  • 15. 

    To use E-mail on the Internet, the two protocols SMTP and POP3 are used on mail servers. Which is the appropriate explanation of this?

    • A.

      SMTP is a protocol for receiving, and POP3 is a protocol for sending.

    • B.

      SMTP is the protocol for the Internet, and POP3 is the protocol for LAN.

    • C.

      The SMTP is a protocol used when one side is client, and POP3 is a protocol used when both sides to transmit are mail servers.

    • D.

      SMTP is the protocol used under normal circumstances when reception is possible, and POP3 is the protocol for fetching mail from the mailbox when connected.

    Correct Answer
    D. SMTP is the protocol used under normal circumstances when reception is possible, and POP3 is the protocol for fetching mail from the mailbox when connected.
  • 16. 

    Which of the following protocols has become a worldwide de facto standard? The protocol is used by the ARPANET in the USA, and is built into the UNIX system.

    • A.

      CSMA/CD

    • B.

      ATM

    • C.

      TCP/IP

    • D.

      ISDN

    Correct Answer
    C. TCP/IP
  • 17. 

    What is the correct description of packet switching?

    • A.

      Compare to circuit switching, the latency within the network is short.

    • B.

      Packet switching service is not possible with ISDN.

    • C.

      In order to carry out communication by packet switching, both the sender and the receiver must be packet mode terminals. (PT)

    • D.

      . By setting multiple logical circuits, concurrent communication with multiple parties can be performed using one physical line.

    Correct Answer
    D. . By setting multiple logical circuits, concurrent communication with multiple parties can be performed using one physical line.
  • 18. 

      Marks: 1 Officially, which port is used for SSH?

    • A.

      110

    • B.

      23

    • C.

      22

    • D.

      443

    Correct Answer
    C. 22
  • 19. 

    Which is the most appropriate practice for user ID management?

    • A.

      When privileges are set for a user ID, they should be minimized.

    • B.

      A user having multiple user IDs should set the same password for all the IDs.

    • C.

      When a user ID is to be deleted, an adequate time interval should be taken after the termination of its use has been notified.

    • D.

      All the users involved in the same project should use the same user ID.

    Correct Answer
    A. When privileges are set for a user ID, they should be minimized.
  • 20. 

    There is a transposition cryptosystem in which plain text is devided into four-character blocks and in each block, the first character is moved to the third, the second to the first, the third to the fourth, and the fourth to the second. In this system, which is the correct cipher text for the plain text "DEERDIDDREAMDEEP"?

    • A.

      DIDDDEEPDEERREAM

    • B.

      EDREDDDIARMEEDPE

    • C.

      IDDDEPDEERDEEMRA

    • D.

      . ERDEIDDDEMRAEPDE

    Correct Answer
    D. . ERDEIDDDEMRAEPDE
  • 21. 

    Which is the correct statement about the recent increase in macro viruses?

    • A.

      Activating the system from an infected floppy disk loads the macro virus into the main meory, and then the virus infects the boot sectors of other floppy disks.

    • B.

      Since it can be easily determined as to whether a macro function is infected by a virus, infection can be prevented at the time of opening a document file.

    • C.

      A macro virus infects document files opened or newly created after an infected document file is opened.

    • D.

      The execution of an infected application loads in the macro virus into the main memory, and in this process, the virus infects program files of other applications.

    Correct Answer
    C. A macro virus infects document files opened or newly created after an infected document file is opened.
  • 22. 

    Which of the following operation methods is NOT appropriate for use with a computer system used with public telephone network?

    • A.

      To ensure that the user does not forget the password, it is displayed on the terminal at the time of log on.

    • B.

      When there is a request for connection, a callback will be made to a specific telephone number to establish the connection.

    • C.

      . If a password is not modified within a priviously specified period of time, it will no longer be possible to connect using this password.

    • D.

      c. If the password is entered wrongly for a number of times determined in advanced, the line will be disconnected.

    Correct Answer
    A. To ensure that the user does not forget the password, it is displayed on the terminal at the time of log on.
  • 23. 

    Which is in an inappropriate way of handling passwords and a password file in the system management department?

    • A.

      The depatment should recommend that users record their passwords in their notebooks in order to minimize the frequency of inquiring about their passwords.

    • B.

      Even if a password file records encrypted passwords, the department should make it inaccessible to general users.

    • C.

      It it is possible to set the term of validity of passwords, the term should be used for checking password validation.

    • D.

      The security managers should regularly check whether or not passwords can be easily guessed, and recommend that problem passwords be changed.

    Correct Answer
    A. The depatment should recommend that users record their passwords in their notebooks in order to minimize the frequency of inquiring about their passwords.
  • 24. 

    Which of the following software test methods is used to check whether modifications made for software maintenance have affected other portions or not?

    • A.

      Linkage tests

    • B.

      System tests

    • C.

      Operation tests

    • D.

      Regression tes

    Correct Answer
    D. Regression tes
  • 25. 

    Which of the following is the most appropriate as the description of code design and code management?

    • A.

      Codes inevitably vary, so it is important to put code books in order and to manage them.

    • B.

      Numerals should mainly be used as codes, and Chinese characters should not be used.

    • C.

      Codes should be assigned to make data classification easier, but the addition or expansion of codes should not be considered.

    • D.

      . It is desirable that codes are understandable by themselves. Therefore, the use of longer code is better.

    Correct Answer
    B. Numerals should mainly be used as codes, and Chinese characters should not be used.
  • 26. 

    Software quality characteristics include reliability, usability, maintainability and portability. Which of the following explains reliability?

    • A.

      It indicates whether functions required for software can always be maintained normally under designated conditions.

    • B.

      It indicates the degree of modification which becomes necessary when software is to be used in a different computer environment.

    • C.

      . It indicates how easily operations can be mastered.

    • D.

      It indicates the degree of ease in which modification requests from users or troubles can be handled.

    Correct Answer
    A. It indicates whether functions required for software can always be maintained normally under designated conditions.
  • 27. 

    Software quality characteristics include reliability, usability, maintainability and portability. Which of the following explains reliability?

    • A.

      It indicates whether functions required for software can always be maintained normally under designated conditions.

    • B.

      It indicates the degree of modification which becomes necessary when software is to be used in a different computer environment.

    • C.

      . It indicates how easily operations can be mastered.

    • D.

      It indicates the degree of ease in which modification requests from users or troubles can be handled.

    Correct Answer
    A. It indicates whether functions required for software can always be maintained normally under designated conditions.

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 17, 2022
    Quiz Edited by
    ProProfs Editorial Team
  • May 22, 2012
    Quiz Created by
    Thanhnb
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.